From a business perspective, cloud migrations are driven largely by a desire for flexibility and resilience. When we move systems to the cloud, we expect them to be both more adaptable and more reliable than on-premise solutions. These two objectives are somewhat competitive, however. The Jenga tower is most likely to fall when you are moving a piece. Adding flexibility naturally introduces change which puts stability at risk. (photo credit: pwmag.com)
What we have to say, what you want us to hear.
That’s how our blog works. It’s interactive. Let’s learn together.
Welcome back to the Meet Our Team Q&A series. My name is Daniela Williams, Project Manager at ISE, and I’ll be asking ISE team members questions to help give insight into what makes us tick.
This month provides me the opportunity to share several examples of recent IoT hacks, and demonstrate how one can introduce risks when adding smart devices to a network. Leveraging this survey of happenings in IoT security breaches, it serves as a reminder to the importance of security as IoT evolves. As we’ve talked about in recent posts, MQTT is one example of a standard that is evolving to help address some security concerns in the IoT space. However, as we’ll see in at least one example, if users of IoT devices are not willing to care about security themselves, no amount of fancy protocols will solve your all your problems. Without further delay, let’s read through some of the more interesting recent IoT hacks.
The third summer of the 9-week ISE Coding Garage program came to a close last night, concluding with mobile app presentations and an awards ceremony. In early June, the program started with 15 self-driven students working on their own apps, and ended yesterday as 12 students presented their creations for judging. A new enhancement to this year's presentations was the judging app, created by one of the ISE interns, Jordan Pohlman.